Logarithm design on encrypted data with bitwise operation

Joon Soo Yoo, Baek Kyung Song, Ji Won Yoon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)


Privacy-preserving big data analysis on cloud systems is becoming increasingly indispensable as the amount of information of the individuals is accumulated on our database system. As a way of maintaining security on cloud system, Homomorphic Encryption (HE) is considered to be theoretically eminent protecting against privacy leakage. However, insufficient number of operations on HE are developed, hindering many research developers to apply their knowledgeable techniques on this field. Therefore, we propose a novel approach in constructing logarithm function based on mathematical theorem of Taylor expansion with fundamental arithmetic operations and basic gate operations in usage. Moreover, we present a more accurate way of deriving answers for logarithm using square and shift method.

Original languageEnglish
Title of host publicationInformation Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers
EditorsBrent ByungHoon Kang, JinSoo Jang
PublisherSpringer Verlag
Number of pages12
ISBN (Print)9783030179816
Publication statusPublished - 2019
Event19th World International Conference on Information Security and Application, WISA 2018 - Jeju Island, Korea, Republic of
Duration: 2018 Aug 232018 Aug 25

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11402 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference19th World International Conference on Information Security and Application, WISA 2018
Country/TerritoryKorea, Republic of
CityJeju Island


  • Cloud security
  • Fully homomorphic encryption
  • Logarithm
  • TFHE

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Logarithm design on encrypted data with bitwise operation'. Together they form a unique fingerprint.

Cite this